Paper 2022/1625

Efficient Threshold FHE with Application to Real-Time Systems

Siddhartha Chowdhury, Indian Institute of Technology Kharagpur
Sayani Sinha, Indian Institute of Technology Kharagpur
Animesh Singh, Indian Institute of Technology Kharagpur
Shubham Mishra, University of California, Berkeley
Chandan Chaudhary, Indian Institute of Technology Kharagpur
Sikhar Patranabis, IBM Research, India
Pratyay Mukherjee, SupraOracles Research
Ayantika Chatterjee, Indian Institute of Technology Kharagpur
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur

Threshold Fully Homomorphic Encryption (ThFHE) enables arbitrary computation over encrypted data while keeping the decryption key to be distributed across multiple parties at all time. ThFHE is a key enabler for threshold cryptography and, more generally, secure distributed computing. Existing ThFHE schemes inherently require highly inefficient parameters and are unsuitable for practical deployment. In this paper, we take the first step towards to make ThFHE practically usable by (i) proposing a novel ThFHE scheme with a new analysis resulting in significantly improved parameters; (ii) and providing the first ThFHE implementation benchmark based on Torus FHE. • We propose the first ThFHE scheme with a polynomial modulus-to-noise ratio that supports practically efficient parameters while retaining provable security based on standard quantum-safe assumptions. We achieve this via a novel Rényi divergence-based security analysis of our proposed threshold decryption mechanism. • We present a highly optimized software implementation of our proposed ThFHE scheme that builds upon the existing Torus FHE library and supports (distributed) decryption on highly resource-constrained ARM-based handheld devices. To the best of our knowledge, this is the first practically efficient implementation of any ThFHE scheme. Along the way, we implement several extensions to the Torus FHE library, including a Torus-based linear integer secret sharing subroutine to support ThFHE key sharing and distributed decryption for any threshold access structure. We illustrate the efficacy of our proposal via an end-to-end use case involving encrypted computations over a real medical database, and distributed decryptions of the computed result on resource-constrained handheld devices.

Available format(s)
Cryptographic protocols
Publication info
FHE Threshold Decryption LISSS Torus Rényi Divergence
Contact author(s)
siddhartha chowdhury92 @ gmail com
sayanisinhamid @ gmail com
sanimesh005 @ gmail com
grapheo12 @ gmail com
cchaudhary278 @ gmail com
sikharpatranabis @ gmail com
pratyay85 @ gmail com
cayantika @ gmail com
debdeep mukhopadhyay @ gmail com
2022-11-25: last of 2 revisions
2022-11-22: received
See all versions
Short URL
Creative Commons Attribution


      author = {Siddhartha Chowdhury and Sayani Sinha and Animesh Singh and Shubham Mishra and Chandan Chaudhary and Sikhar Patranabis and Pratyay Mukherjee and Ayantika Chatterjee and Debdeep Mukhopadhyay},
      title = {Efficient Threshold FHE with Application to Real-Time Systems},
      howpublished = {Cryptology ePrint Archive, Paper 2022/1625},
      year = {2022},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.